ENCRYPTION AND TOKENIZATION ARCHITECTURES
First Claim
1. A method for conducting an online transaction on a website involving sensitive information, the method comprising the steps of:
- registering at least one entity with a gate keeper module, the registering comprising associating the at least one entity with a subscription level;
associating a sub-string of a character string with a unique token so that a direct link does not exist between the unique token and the character string, the character string comprising the sensitive information and the sub-string being configured to identify the character string without revealing the sensitive information; and
during processing of the online transaction;
using the unique token for intermediate steps during the processing of the online transaction; and
only accessing the character string in storage memory using the unique token and the sub-string to retrieve the sensitive information and to complete the online transaction using the information for the online transaction and the sensitive information after receiving a request for the sensitive information from at least one of the at least one registered entity associated with a subscription level associated with a privilege to receive the requested sensitive information.
0 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of the present invention are directed to methods, systems and computer program products for conducting an online transaction on a website involving sensitive information. Such embodiments provide methods, systems and computer program products to: (a) register at least one entity with a gate keeper module, the registering comprising associating the entity with a subscription level; (b) associate a sub-string of a character string with a unique token so that a direct link does not exist between the unique token and the character string; and (c) during processing of the online transaction: (i) using the unique token for intermediate steps during the processing of the online transaction; and (ii) only accessing the character string in storage memory to complete the online transaction after receiving a request from at least one registered entity associated with a subscription level associated with a privilege to receive the requested sensitive information.
-
Citations
28 Claims
-
1. A method for conducting an online transaction on a website involving sensitive information, the method comprising the steps of:
-
registering at least one entity with a gate keeper module, the registering comprising associating the at least one entity with a subscription level; associating a sub-string of a character string with a unique token so that a direct link does not exist between the unique token and the character string, the character string comprising the sensitive information and the sub-string being configured to identify the character string without revealing the sensitive information; and during processing of the online transaction; using the unique token for intermediate steps during the processing of the online transaction; and only accessing the character string in storage memory using the unique token and the sub-string to retrieve the sensitive information and to complete the online transaction using the information for the online transaction and the sensitive information after receiving a request for the sensitive information from at least one of the at least one registered entity associated with a subscription level associated with a privilege to receive the requested sensitive information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for conducting an online transaction on a website involving sensitive information, the system comprising:
-
one or more processors; and one or more storage devices coupled to the one or more processors and adapted for storing a character string; wherein the one or more processors execute a gatekeeper module to; register at least one entity with the gatekeeper module, the registering comprising associating the at least one entity with a subscription level; associate a unique token with a sub-string of a character string wherein a direct link does not exist between the unique token and the character string, the character string comprising the sensitive information and the sub-string being configured to identify the character string without revealing the sensitive information; and during processing of the online transaction; use the unique token for intermediate steps during the processing of the online transaction; and only access the character string in the one or more storage devices using the unique token and the sub-string-to retrieve the sensitive information and to complete the online transaction using the information for the online transaction and the sensitive information after receiving a request for the sensitive information from at least one of the at least one registered entity associated with a subscription level associated with a privilege to receive the requested sensitive information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product comprising at least one non-transitory computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable program code portions comprising:
-
an executable portion configured to register at least one entity with the gatekeeper module, the registering comprising associating the at least one entity with a subscription level; an executable portion configured to associate a unique token with a sub-string of a character string wherein a direct link does not exist between the unique token and the character string, the character string comprising the sensitive information and the sub-string being configured to identify the character string without revealing the sensitive information; and during processing of the online transaction; an executable portion configured to use the unique token for intermediate steps during the processing of the online transaction; and an executable portion configured to only access the character string in one or more storage devices using the unique token and the sub-string to retrieve the sensitive information and to complete the online transaction using the information for the online transaction and the sensitive information after receiving a request for the sensitive information from at least one of the at least one registered entity associated with a subscription level associated with a privilege to receive the requested sensitive information. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification